Jump to content

qwertyaccount

Elite Member
  • Content Count

    1922
  • Joined

  • Last visited

Everything posted by qwertyaccount

  1. I'm sorry for your loss. Far from ideal, but a quick will can be done quickly by writing out your wishes on a piece of paper and signing it. It has to be written out "in your own hand" and not typed. This is called a holograph will and does not need to be witnessed.
  2. 4,000... Wow! I'm speechless, but apparently you are not :)
  3. It could also be that they need to act fast to be seen doing "something". This is a no-win type situation for any government; if they do nothing then they are endorsing prostitution, if they make it illegal they are taking away the ability of people to make an otherwise legal living.
  4. Although I would appreciate most any gift from a lady, I'm not sure what I would do with a pair of her panties. I'm pretty easy going on fabric, style, etc., but with my luck they wouldn't be my size and the colour wouldn't go good with my eyes and skin complexion. Receiving a pair of crotch-less panties would add another problem for me - stuff that I need to keep in would fall out. I'm afraid I'm going to have to stick to men's boxers for now.
  5. Let's put it this way, which would you rather take for a spin: 1955 Mercedes 300SL gullwing: Current Mercedes SLS gullwing: My choice: Both! Each car has something different to offer and not because one is newer than the other, but just because they are different.
  6. In my limited experience, not every lady be she civilian or not, will care to join you in the shower. That said, for me any shower for two is a great one.
  7. Two fighter Jets Over The Swiss Alps: Rainbow Titanium Quartz Crystal: Blue Dragon River: Rainbow Rock:
  8. Cookie Monster Going For A Ride:
  9. You could just describe the photo/video - often the description is more enjoyable then the real thing and like reading a good book, we get to use our imagination.
  10. Great points fstop, especially about having a duplicate. You are right, there is plenty of software to encrypt the entire USB drive, including "Bitlocker to Go" that is built into Windows 7 and 8. Fortunateone, you are right, if the entire drive is encrypted with software, including BitLocker, anyone finding such a drive would have reformatted/erased the drive or thrown it away. Just to clarify, my suggestion was to use a USB drive that has built-in hardware encryption that allows you to have two partitions, one encrypted and one normal -- effectively two separate drives in one device. The access utility that is stored in the regular/unencrypted partition can be deleted and downloaded from the manufacturer when needed. With multiple partition (drive) hardware encryption the "found it" story would make sense - the regular/unencrypted partition contains your cat photos and salsa recipes, the encrypted partition, if you even knew it existed because it is typically invisible until the access utility is used, contains who-knows-what. Hardware encryption systems often offer an additional feature that the software based solutions do not - the ability to automatically erase the drive if the wrong password is entered more than a certain number of times (3 strikes & you're out). This cannot be provided by a software system because the encrypted information can simply be copied from the drive. For example: an 8G drive - 1G hardware encrypted and 7G unencrypted. Without using the access utility, the 7G portion is there for everyone to see and use. Only with the utility is the 1G portion even visible. Who wouldn't use a 7G found drive and not care about the missing 1G. Besides, it would take a sharper person to even realize that 1G was missing. A special note about found USB drives: Be very careful, they are a great way of spreading malware - some drives containing malware are purposely "lost" outside businesses hoping the finder will use it on their office computer to see what is on it and the bad guy now gains access to an otherwise protected system.
  11. Some USB flash drives such as the encrypted models from Kingston http://www.kingston.com/us/usb/encrypted_security allow you to have both encrypted and unencrypted (normal) partitions. Verbatim as a very small tuff-n-tiny USB drive http://www.verbatim.com/prod/usb-drives/everyday-usb-drives/tuff-n-tiny/ that also can have encrypted/unencrypted partitions and can be tucked away most anyplace. You can put all of your private info into the encrypted partition and some benign stuff in the normal partition. If you ever asked for the password to the encrypted partition you can just say that you don't know because you found it on the bus, erased the normal partition and used it for your own stuff. You probably didn't even know the encrypted partition even existed.
  12. Your list and mine are probably very similar!
  13. I'm always trying to learn how to do things better. To learn what to do in a Duo, I found and watched a video called "Twin Screw Handling". It wasn't what I expected :(
  14. Being an SP is a legal profession. I can be friends with anyone who's job is a legal profession. That is except for someone who is a parking meter maid :)
  15. The first ever large-scale, self-spreading personal computer virus ever produced 32 years ago was for an [I][U]Apple[/U][/I] and not a PC :) [URL="http://edn.com/user/suzanne.deffree"][FONT=Arial][SIZE=1][COLOR=blue]Suzanne Deffree[/COLOR][/SIZE][/FONT][/URL][FONT=Arial][SIZE=1][COLOR=blue] -January 30, 2014 [/COLOR][/SIZE][/FONT] [FONT=Arial][COLOR=blue]A 15-year-old boy on winter break from high school wrote what is considered to be the first large-scale, self-spreading personal computer virus on January 30, 1982. [IMG]http://m.eet.com/media/1177918/skranta.jpg[/IMG]Richard Skrentaâ??s â??Elk Clonerâ? was 400 lines long and disguised as an Apple boot program. (See Skrenta's current day photo, right) What has since been described by its author as "some dumb little practical joke,â? the virus attached itself to the Apple DOS 3.3 operating system and spread by floppy disk. Skrenta was already known as a video game prankster among his friends. He often shared his gaming software after altering the disks in a way that would interrupt the game with taunting messages. As such, some of his friends had stopped swapping games with him. To continue pranking, Skrenta had to find a way to alter floppy disks without physically touching them. This lead him to create what is now known as a boot sector virus through Elk Cloner. Skrenta left Elk Cloner residue in the operating system of his school's Apple II. Any student who did not do a clean reboot with their own disk could then be touched by the code. An infected computer would display the following short poem on every 50th boot: Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes, it's Cloner! It will stick to you like glue It will modify RAM too Send in the Cloner! Considered very contagious, Elk Cloner successfully infected the floppies of most people Skrenta knew. That was considerably easy to do as in 1982 personal computing was still new and most were not wary of viruses, nor were virus scanner programs available. Elk Cloner could be removed, but it required an elaborate manual effort. Skrenta went on to graduate Northwestern in 1989 with a BA in computer science. According to Skrentaâ??s [/COLOR][/FONT][URL="http://www.linkedin.com/in/skrenta"][FONT=Arial][COLOR=blue]LinkedIn profile[/COLOR][/FONT][/URL][FONT=Arial][COLOR=blue], he is now CEO of search-engine start-up Blekko. One LinkedIn recommendation for Skrenta reads: â??Fear this man and his army of cyborgs.â? [/COLOR][/FONT]
  16. You'll also know that you click with both ladies - something pretty important!
  17. Some audiophiles also swear by gold plated $300 USB cables - there's one born every minute!
  18. http://www.aol.com/article/2014/01/24/dad-spent-2-5-years-in-prison-for-blogging-about-his-divorce/20815576/ Dad spent 2.5 years in prison for blogging about his divorce Jan 24th 2014 5:13PM #fivemin-widget-blogsmith-image-102830{display:none;} .cke_show_borders #fivemin-widget-blogsmith-image-102830, #postcontentcontainer #fivemin-widget-blogsmith-image-102830{width:570px;height:411px;display:block;} In 2008, Indiana father Dan Brewington took to his blog to chronicle the difficulties surrounding his divorce proceedings. Frustrated by the lack of answers he received from the closed case file, he posted documents, along with his musings, online, and ended up serving time in prison as a result. 'The custody evaluator wasn't being consistent in his statements,' he told HuffPost Live host Nancy Redd. 'I started questioning it, raising it with the court. Nobody could provide me with a legitimate answer. So what I wound up doing was making a website and a blog. And I put the information on the internet.' But it was Brewington's criticism of the judge in his case that ended up landing him in prison. 'The prosecutor said, 'you're not allowed to lie.' And so the prosecutor said I called the judge a child abuser. That was one of their biggest complaints. They just started reading statement after statement after statement from the blog saying that the judge was unethical, that he's an evil man, that he's a child abuser for taking children away from their parents. Things of that nature. Just a lot of rhetorical statements.' When Brewington decided to fight the court for his First Amendment rights instead of accepting a plea bargain, he was sentenced to five years in prison, half of which he served. Since being released from Putnamville Correctional Facility, Brewington has yet to see his two daughters. 'I don't have any contact with them. No phone contact,' he said. To learn more, watch his full segment here.
×
×
  • Create New...